An image forming apparatus includes: a combining unit configured to combine a document image and a coded image; a setting determining unit configured to determine whether a setting for combining a document image including a previously combined coded image and an other coded image is made when a reproduction of the document image is instructed; and a prohibiting unit configured to prohibit the combining unit from combining the document image including the previously combined coded image and the other coded image according to the setting when the result of the determination indicates that the setting is made.
|
3. A method for executing a copy operation, comprising:
reading a document to obtain an image via a reading unit;
printing the obtained image to obtain a copied document via a printing unit;
setting a setting to add an image indicating that copying the copied document is permitted subject to an input of first authentication information to the obtained image via a setting unit; and
controlling the printing unit via a controlling unit so that in a case where a document having an image indicating that copying the document is permitted subject to an input of second authentication information is read to obtain an image and the setting is not set, the obtained image is printed subject to an input of the second-authentication information, and
in a case where a document having an image indicating that copying the document is permitted subject to an input of second authentication information is read to obtain an image and the setting is set, the obtained image is not printed.
1. An apparatus for executing a copy operation, comprising:
a reading unit configured to read a document to obtain an image;
a printing unit configured to print the obtained image to obtain a copied document;
a setting unit configured to set a setting to add an image indicating that copying the copied document is permitted subject to an input of first authentication information to the obtained image; and
a controlling unit configured to control the printing unit so that in a case where a document having an image indicating that copying the document is permitted subject to an input of second authentication information is read to obtain an image and the setting is not set, the obtained image is printed subject to an input of the second authentication information, and
in a case where a document having an image indicating that copying the document is permitted subject to an input of second authentication information is read to obtain an image and the setting is set, the obtained image is not printed.
4. A method for executing a copy operation, comprising:
reading a document to obtain an image via a reading unit;
printing the obtained image to obtain a copied document via a printing unit;
setting a setting to add an image indicating that copying the copied document is permitted subject to an input of first authentication information to the obtained image via a setting unit; and
controlling the printing unit via a controlling unit so that in a case where a document having an image indicating that copying the document is permitted subject to an input of second authentication information is read to obtain an image and the setting is not set, the obtained image is printed subject to an input of the second authentication information, and in a case where a document having an image indicating that-copying the document is permitted subject to an input of second authentication information is read to obtain an image and the setting is set, the obtained image is printed subject to an input of the second authentication information without adding the image indicating that-copying the copied document is permitted subject to an input of the first authentication information to the obtained image.
2. An apparatus for executing a copy operation, comprising:
a reading unit configured to read a document to obtain an image;
a printing unit configured to print the obtained image to obtain a copied document;
a setting unit configured to set a setting to add an image indicating that-copying the copied document is permitted subject to an input of first authentication information to the obtained image; and
a controlling unit configured to control the printing unit so that in a case where a document having an image indicating that-copying the document is permitted subject to an input of second authentication information is read to obtain an image and the setting is not set, the obtained image is printed subject to an input of the second authentication information, and
in a case where a document having an image indicating that-copying the document is permitted subject to an input of second authentication information is read to obtain an image and the setting is set, the obtained image is printed subject to an input of the second authentication information without adding the image indicating that-copying the copied document is permitted subject to an input of the first authentication information to the obtained image.
5. A non-transitory computer-readable storage medium that stores a program causing an apparatus to execute a copy operation method as claimed in
6. A non-transitory computer-readable storage medium that stores a program causing an apparatus to execute a copy operation method as claimed in
|
This application is a continuation of U.S. patent application Ser. No. 12/167,043 filed Jul. 2, 2008, which claims priority from Japanese Patent Application No. 2007-177634 filed on Jul. 5, 2007, all of which are hereby incorporated by reference herein their entirety.
1. Field of the Invention
The present invention relates to an image forming apparatus that prints a document image according to a print instruction and a print controlling method for the same.
2. Description of the Related Art
With promotion of information technology (IT) in offices, interest for security has been rising recently. For example, as seen in repeatedly caused leakage of client information held by companies, confidential information of organizations and privacy of individuals are threatened, which has become a big social issue.
To cope with such an issue, an IT mechanism for providing an access right to electronic confidential information or a monitoring apparatus at firewall is introduced to prevent the confidential information from being leaked to outside of the companies. Alternatively, measures of prohibiting portable media, such as a notebook personal computer (PC) and a universal serial bus (USB) flash memory, from being carried in or out are taken.
By taking the above-described measures using the IT mechanism, the electronic confidential information can be protected to some extent. This is because the electronic information can be referred to only using the IT and it is easier to introduce the IT mechanism thereto.
On the other hand, when confidential information is printed on paper media with an image forming apparatus or the like, carrying out of a sheet having confidential information of organizations or private information of individuals printed thereon can escape the above-described IT mechanism. Accordingly, it is more difficult to confirm and prohibit such a sheet from being carried out than to restrict electronic confidential information from being carried out, which makes it difficult to maintain the security.
To cope with such an issue, various measures for information leakage have been considered. As a first measure for information leakage, a system that embeds tracking information on paper media in addition to a main image using known information embedding techniques, such as the digital watermarking and the 2-dimensional barcode, at the time of printing has been suggested.
Even if information leakage involving paper media occurs, this system can extract the above-described tracking information by analyzing the leaked document. Accordingly, since the responsibility for careless carrying out of a document can be investigated using the tracking information, a deterrent effect can be expected.
Furthermore, as a second measure for information leakage, a system for embedding copy restriction information for prohibiting copying in paper media using known information embedding techniques, such as the digital watermarking and the 2-dimensional barcode, at the time of printing has been suggested.
In this system, a compatible image forming apparatus extracts the above-described copy restriction information to detect whether copying is permitted at the time of execution of a copy operation, thereby being able to control continuance or cancellation of the copy operation for each page.
A system for embedding, as condition information, password information and permitted user information as well as copy restriction information simply indicating whether copying is permitted and for permitting only specific users to copy a document has been suggested. For example, Japanese Patent Laid-Open No. 2003-280469 disclosing a system of this kind is known. Hereinafter, the above-described tracking information and copy restriction information are collectively referred to as “additional security information”.
In the related art, such additional security information can be unconditionally embedded regardless of whether additional security information has previously been embedded in a document.
However, when a plurality of pieces of additional security information is embedded in a document, an image forming apparatus according to the related art may be unable to extract the additional security information due to interference of the plurality of pieces of additional security information.
An image forming apparatus according to an aspect of the present invention includes: a combining unit configured to combine a document image and a coded image; a setting determining unit configured to determine whether a setting for combining a document image including a previously combined coded image and an other coded image is made when a reproduction of the document image is instructed; and a prohibiting unit configured to prohibit the combining unit from combining the document image including the previously combined coded image and the other coded image according to the setting when the result of the determination indicates that the setting is made.
Further features and aspects of the present invention will become apparent from the following description of exemplary embodiments with reference to the attached drawings.
An image forming apparatus according to exemplary embodiments of the present invention, a print controlling method for the same, an image forming system, a program, and a storage medium will be described with reference to the attached drawings. The image forming apparatus according to the exemplary embodiments can be applied to a network printing system.
[Overall Arrangement of System]
In response to a user operation of the client PC 111 or 112 (corresponding to an image processing apparatus), the client PC 111 or 112 generates print data and sends the print data to the print server 121. The print server 121 further sends the received print data to the image forming apparatus 131 or 132. The image forming apparatus 131 or 132 interprets and converts the received print data into an image and prints the image on a piece of paper to create a printed material.
The above-described configuration is only an example and the print server 121 may be omitted. In that case, the client PC 111 or 112 directly sends the print data to the image forming apparatus 131 or 132. At this time, the apparatuses may be connected to each other using a known local interface, such as IEEE 1284 or a universal serial bus (USB), instead of the LAN 101.
[Instruction of Embedding Copy Restriction Information or Printed-Output Tracking Information and Copy Restriction Operation]
An operation of the entire system will be briefly described first. Referring to the configuration shown in
As shown in
Although the operation of the entire system has been briefly described in the above, a series of these operations will be described more specifically.
[Specification of Copy Control Information or Tracking Information in Client PC]
The upper half part where the copy restriction setting is made will be described first. In this exemplary embodiment, a user operates radio buttons 502 to select one of three setting options of “permit copying”, “(always) prohibit copying”, and “set copy permitting conditions (cancel copy prohibition in response to input of a password)”. If the third option “cancel copy prohibition in response to input of a password” is selected, a password input field 503 is activated to receive the input and a user can input a password for canceling copy prohibition.
The lower half part of the print security setting dialog 501 where the tracking information setting is made will now be described. In this exemplary embodiment, two checkboxes 504 and 505 are provided. A user checks the checkboxes 504 and 505, thereby instructing embedding of a user name and time information, respectively.
Although these two kinds of tracking information have been shown in this exemplary embodiment, any give kinds of tracking information can be included as long as the information is held in the image forming apparatus. For example, an internet protocol (IP) address and a media access control (MAC) address of the image forming apparatus 131 and a division name of an installed place or an office may be attached as the tracking information.
The above-described various kinds of information are stored in a job restriction information storage section 304 (see
[Copy Restriction Operation in Image Forming Apparatus]
An example screen displayed upon the image forming apparatus 131 or 132 detecting inclusion of copy restriction information in a document will now be described. This screen is displayed on an operation unit 812 (see
[Appearance of Image Forming Apparatus]
A document is set at a tray 802 of a document feeder 801. In response to a user's instruction of starting scanning entered using the operation unit 812, the scanner unit 813 receives a document scanning instruction. Upon receiving this instruction, the scanner unit 813 scans each document fed from the tray 802 of the document feeder 801. Meanwhile, as a document scanning method, a method of scanning the document mounted on a glass surface (not shown) by moving an exposure unit may be employed instead of an auto feeding method using the document feeder 801.
A printer unit 814 is an image forming device that forms an image of the image data on a piece of paper. Although an electrophotographic system using a photosensitive drum and a photosensitive belt is employed as an image forming method in this exemplary embodiment, the image forming method is obviously not limited to this method. For example, the image forming method may be an inkjet method for discharging ink from a small nozzle array and printing an image onto a sheet. In addition, the printer unit 814 is equipped with a plurality of sheet cassettes 803, 804, and 805 that allow different sheet sizes and different sheet directions to be selected. A printed sheet is discharged at a discharge tray 806.
[Operation for Creating Printed Output including Additional Security Information]
An operation for creating a printed output including additional security information will now be described in detail with reference to
As described above,
A user performs a print instructing operation in the client PC 111, whereby the print data generating section 301 is activated. The print data generating section 301 is realized by a print subsystem in which a printer driver operates in cooperation with an operating system (OS).
The print data generating section 301 converts a document that a user has instructed to print into a group of drawing instructions to be given to the image forming apparatus to generate print data. More specifically, this conversion is realized by generating, for example, the page description language (PDL). The print data generating section 301 sends the generated print data to the image combining section 302.
The job restriction information storage section 304 sends job restriction information, held therein as a result of a user operation performed on the security setting dialog shown in
The meta information image generating section 305 generates a background image including copy restriction information and tracking information based on the job restriction information received from the job restriction information storage section 304. There is a method using, for example, low visibility barcode (LVBC) as a method for generating this background image. The LVBC will be described later. The meta information image generating section 305 sends the generated background image to the image combining section 302.
The image combining section 302 combines the print data received from the print data generating section 301 and the background image received from the meta information image generating section 305 to create an instruction to be given to the image forming apparatus so that the background image is included in each page of the print data. More specifically, there is a method for embedding the background image in the PDL as overlay form information. The image combining section 302 sends the combined print data to the data sending section 303.
The data sending section 303 sends the combined print data to the print server 121 or the image forming apparatus 131 or 132. Since
On the other hand, in the image forming apparatus, the data receiving section 311 waits for data sent via the LAN 101. Upon detecting transmission of data from another node in the LAN, the data receiving section 311 transfers the received data to an appropriate subsystem according to the type of the data. The type of data is generally identified by the port number when transmission control protocol/internet protocol (TCP/IP) is employed as the communication protocol, for example. The port number 515 used in the line printer daemon (lpr) and the port number 9100 used in the raw are known as a general port number. In this exemplary embodiment, the received data is print data including a print instruction given to the image forming apparatus. After confirming that the received data is the print data, the data receiving section 311 transfers the data to the data analyzing section 312.
The data analyzing section 312 extracts the drawing instruction (PDL) from the data received from the data receiving section 311. The data analyzing section 312 interprets the data and generates intermediate data used internally in the image forming apparatus. The data analyzing section 312 sequentially sends the generated intermediate data to the image generating section 313.
The data generating section 313 converts the intermediate data received from the data analyzing section 312 into a bitmap image. In addition, the image generating section 313 compresses the bitmap image and then sequentially sends the compressed image to the printing section 314. The printing section 314 prints the bitmap image received from the image generating section 313 onto a paper medium.
As described above,
A user performs a print instructing operation in the client PC 111, whereby the print data generating section 301 is activated. Since the operation of the print data generating section 301 is the same as that described with reference to
The data sending section 302 integrates the print data received from the print data generating section 301 and the job restriction information received from the job restriction information storage section 304 into print instruction data to be given to the image forming apparatus. Furthermore, the data sending section 302 sends the integrated print instruction data to the print server 121 or the image forming apparatus 131 or 132. Since
On the other hand, in the image forming apparatus, since the operation of the data receiving section 311 is the same as that described with reference to
The meta information image generating section 416 interprets the job restriction information received from the data analyzing section 312 and generates a background image according to the job restriction information using a technique for embedding information in an image, such as, for example, LVBC. The meta information image generating section 416 sends the generated background image to the image combining section 414.
The image combining section 414 combines the bitmap image received from the image generating section 313 and the background image received from the meta information image generating section 416 and sends a bitmap image of the combined result to the printing section 314. Since the operation of the printing section 314 is the same as that described with reference to
[Embedding of Additional Security Information During Copy Operation of Image Forming Apparatus]
It is assumed in
A setting operation for embedding additional security information performed in the image forming apparatus will be described using
The GUI 2801 also includes a state displaying window 2804 for displaying copy settings and an application mode button 2805 for receiving detailed copy settings. A setting for embedding the additional security information is performed on a GUI displayed in response to pressing of this application mode button 2805.
To perform the setting operation for embedding of the additional information, a user presses the information embedding button 2904 to make detailed settings.
When the third setting option “cancel copy prohibition in response to input of a password” is selected, a password input field 3103 becomes active and a user can input a password to cancel the copy prohibition.
A user places a document on the scanner unit 813 and operates the operation unit 812 to instruct the start of a copy operation. In response to the instruction, the image scanning section 901 (corresponding to a scanning unit) is activated and the copy operation is started. The image scanning section 901 scans the document and sends image data thereof to the image combining section 414.
The job restriction information storage section 2704 sends job restriction information, held therein as a result of a user operation performed on various setting dialogs (see
The image combining section 414 combines the document image data received from the image scanning section 901 and the background image received from the meta information image generating section 416. The image combining section 414 sends the combined image data to the printing section 314. Since the operation of the printing section 314 is the same as that described with reference to
In addition, when an administrator of an image forming apparatus creates a printed output using the image forming apparatus, the administrator may set the image forming apparatus so that the additional security information is compulsorily embedded.
In response to pressing of the compulsory information embedding button 3304, information to be embedded is set according to the same flow of screens as those displayed in response to pressing of the information embedding button 2904 (see
In the former case, once the administrator makes the setting, the setting is valid until the administrator cancels the setting and a copy prohibition image is compulsorily embedded when the image forming apparatus creates a printed output. On the other hand, in the latter case, the setting is made for each job entered by a general user. In addition, when the compulsory information embedding setting is made, the information embedding button 2904 of the application mode is displayed in gray so that the compulsory information embedding setting and the information embedding setting of the application mode cannot be selected at the same time.
[Detailed Description of Copy Restriction Operation in Image Forming Apparatus]
A user places a document including copy restriction information on the scanner unit 813 and operates the operation unit 812 to instruct the start of a copy operation. In response to the instruction, the image scanning section 901 is activated and the copy operation is started. The image scanning section 901 scans the document image and sends image data thereof to the image processing section 905 and the image analyzing section 312.
The image analyzing section 312 extracts the copy restriction information included in the image data received from the image scanning section 901. The image analyzing section 312 sends the extracted copy restriction information to the job control determining section 903.
The job control determining section 903 compares the copy restriction information received from the image analyzing section 312 with the copy restriction conditions stored in the setting information storage section 904 to determine whether to cancel the copy operation. For example, when the radio button 502 (see
Here, if the job control determining section 903 determines that the copy operation should be canceled, the job control determining section 903 sends an instruction for canceling the operation to the printing section 314. The job control determining section 903 then displays a message dialog 602 (see
The image processing section 905 converts the image data according to a function set using the application mode button 2805 (see
This series of operations corresponds to generation of a background image according to the job restriction information held in the job restriction information storage section 2704 performed by the meta information image generating section 416 and combination of the background image and the image data of the document scanned by the image scanning section 901 performed by the image combining section 414. Accordingly, the image processing section 905 performs processing performed by the image combining section 414, the job restriction information storage section 2704, and the meta information image generating section 416.
Upon receiving the image data from the image processing section 905, the printing section 314 prints the above-described image data onto a sheet or cancels the printing operation according to the result of the determination fed from the job control determining section 903.
Processing performed by the image analyzing section 312 to the setting information storage section 904 is not described in an image forming apparatus (see
[LVBC]
In this exemplary embodiment, low visibility barcodes (LVBC) will be described as an example of a technique for embedding additional security information. Here, an information embedding section indicates a unit included in an image forming apparatus that adds desired information to a print target image and prints the combined image onto an image forming medium (hereinafter, referred to as a sheet), such as a sheet of paper and a sheet used for an overhead projector (an OHP sheet).
The following are requirements for a general information embedding section.
To be able to realize embedding of an enough amount of data in a sheet since the section has to embed information.
To be able to accurately extract, as digital information, information embedded in a sheet using a color material (toner or ink).
To be resistant to factors preventing information from being extracted, such as rotation, enlargement, reduction, and partial deletion of a document caused at the time of copying of a document image on a sheet, a signal level decrease and a stain resulting from copying, to some extent.
To have a realtime processing ability that permits information to be extracted at the time of copying or a high processing speed equivalent thereto to prevent a copy restricted document from being copied.
The LVBC described in this exemplary embodiment satisfies the above-described requirements.
[Two Areas]
A first area and a second area of an area including embedded additional security information will now be described.
On the other hand, the tracking information is embedded in the second area. Since the tracking information is extracted when an administrator performs analysis operation at the time of exposure of information leakage, the extraction processing does not have to be performed during the normal copy operation. Accordingly, even if the realtime processing is not guaranteed, the processing speed does not affect the entire copy speed and a decrease in the processing speed is permitted to some extent.
Since the tracking information has to include a large amount of information, the data size has to be relatively large. A name of a user created the document, a name of an organization to which the user belongs, a serial number of an image forming apparatus, and an IP address or a MAC address can be considered as information to be embedded as the tracking information. Furthermore, information such as an installed place, a print date, and a print time may be used as the tracking information.
To satisfy these different requirements, the additional security information can be embedded in both of the first area and the second area in the LVBC according to this exemplary embodiment. It is possible to select extraction of only the first area, extraction of only the second area, or extraction of both areas according to the utilization state (use case). In addition, when extracting only the first area, the image forming apparatus according to this exemplary embodiment can improve the analysis speed and perform the extraction processing at a speed that does not affect the productivity of the copy operation.
A second area 1102 is represented by a larger rectangle. As in the case of the first area 1101, the second areas 1102 represented by rectangles are arranged periodically. The information of the second area 1102 is not embedded in the first area 1101 and the information is exclusively written in the respective areas. In addition, in the drawing, a size 1103 of the first area, a repeated cycle 1104 of the first areas, and a size 1105 of the second area are shown.
[LVBC Embedding Method]
A method for embedding LVBC will now be described. In addition to an image printed onto a sheet, a dot pattern called grid is printed to embed additional security information in the LVBC. The dots 203 shown in
The additional security information is input as binary data having a size equal to or smaller than a predetermined value. Additional data is realized by displacement of dots (drifting from the center) in eight directions (up, down, left, and right) with respect to the dots constituting the grid and is embedded as the additional security information.
No dot is placed at a center 1202. In practice, for example, a dot is displaced and arranged at a position 1203 apart from the center 1202. “010111110011” is divided into three-bit values “010”, “111”, “110”, and “011”. Furthermore, decimal conversion is performed on each three-bit value and the three-bit values are converted into 2, 7, 6, and 3. Each dot constituting the grid is displaced in one of the eight directions corresponding to the value, thereby being able to represent the information. In this case, the values 2, 7, 6, and 3 can be embedded as the information by displacing the position of the dots in the upper right direction, the lower right direction, the downward direction, and the left direction, respectively.
By repeating such processing, the additional security information having a size of 2000 bytes at most can be embedded in a sheet as the LVBC. Furthermore, repeated embedding of dots representing the additional security information increases the redundancy and can improve the reliability to misconception of an image and a stain, creases, and partial destruction of a sheet. Details regarding the analysis will be described in a description for an LVBC analysis method, which will be given later.
Analysis of the LVBC requires an accurate examination of the grid position and it is desirable that the dots displace in the eight directions at an equal probability. However, there is a case where a specific data, such as a value 0, is desired to be embedded more often and the equal probability may not be achieved without any processing. Accordingly, in this exemplary embodiment, reversible scramble processing (e.g., common key encryption processing using a unique key) is performed on the information to be embedded and the information is embedded after the displacement of the dot is randomized. The meta information image generating section 416 generates the additional security information.
Embedding of the LVBC can be realized with a relatively simple mechanism since it is D/A conversion in which the additional security information, which is digital data, is recorded on a sheet as analog data. The information is embedded in the above-described two areas by applying the above-described embedding method.
The first areas 1101 and the second areas 1102 shown in
[LVBC Analyzing Method]
An LVBC analyzing method will now be described.
The dot detecting unit 1302 extracts a given dot from an additional-security-information-containing image (in which an original image and additional security information coexist) and determines coordinates. The dot analyzing unit 1303 eliminates unnecessary dots, such as dots constituting halftone, from the dots detected by the dot detecting unit 1302. The absolute coordinate list storage unit 1304 stores a list of absolute coordinates of a plurality of dots resulting from the analysis of the dot analyzing unit 1303.
The dot converting unit 1305 detects a rotation angle and a grid interval based on the list of the absolute coordinates of the plurality of dots stored in the absolute coordinate list storage unit 1304 and converts the absolute coordinates into relative coordinates from the grid position. Meanwhile, the grid interval detected here is used in determination of destruction of embedded security information at the time of enlargement/reduction.
The relative coordinate list storage unit 1306 stores relative coordinates, from the grid position, of the plurality of dots analyzed by the dot converting unit 1305. The first area decrypting unit 1307 extracts the first area of the embedded additional security information and outputs the extraction result to a subsequent stage. The second area decrypting unit 1308 extracts the second area of the embedded additional security information and outputs the extraction result to a subsequent stage. Meanwhile, the size of the second area detected at this time is used in determination of destruction of the embedded security information at the time of specification of an area or execution of movement.
“The subsequent stage” used here indicates a functional module that utilizes the additional security information. For example, the subsequent stage corresponds to a functional module that cancels a printing operation when copy restriction information is extracted as the additional security information and that displays sheet owner information on an operation display when tracking information is extracted.
[Dot Detection]
An operation of the dot detecting unit 1302 will now be described. The dot detecting unit 1302 receives image data of a document scanned by an optical scanner as a multilevel monochrome image. Although the information of LVBC is embedded as bilevel monochrome dots 203 (see
[Dot Analysis]
An operation of the dot analyzing unit 1303 will now be described. The dots detected by the dot detecting unit 1302 may be dots other than those constituting the LVBC. For example, a dot pattern for expressing halftone included in a document image and isolated points (e.g., a voice sound symbol of hiragana (one kind of Japanese character)) originally included in the document correspond to such dots. To remove the isolated points that are not dots constituting the LVBC, halftone elimination has to be performed.
On the other hand, since the shape and density of the dots are not standardized in halftone, the dots sparsely appear at a broader range of the graph and the appearance frequency is relatively low. By utilizing this characteristic, a position at which the appearance frequency shows a narrower peak is identified as a dot of the LVBC and stored in the absolute coordinate list storage unit 1304. Other dots are eliminated. Through this operation, the LVBC dots are stored in the absolute coordinate list storage unit 1304.
[Dot Conversion]
An operation of the dot converting unit 1305 will now be described. An angle at which LVBC dots are embedded at the time of printing differs from an angle of dots in a scanned image because of a difference in a direction of a document placed on a scanner and a small difference in angles at an analog level. Accordingly, the rotation angle has to be detected and corrected. In addition, since information is embedded in displacement from a grid position to which the dot belongs in the LVBC, the grid has to be reproduced and a grid interval has to be accurately decided.
a−x≦0 or |a−x|≦|b−y| (1)
The dot (a, b) that gives the smallest distance between the focused dot (x, y) and the dot (a, b) is recognized as a neighboring dot and the distance X between the two dots is treated as a candidate of the grid interval.
Here, since both the focused dot 1601 and the neighboring dot 1602 are displaced to embed the information, the distance therebetween may indicate a value different from the actual grid interval. In addition, the dot recognized as the LVBC dot may be a halftone pattern that the dot analyzing unit 1303 has failed to eliminate. Thus, the dot converting unit 1305 measures the inter-grid distance regarding all of focused dots (x, y) and creates a histogram showing a frequency for each inter-grid distance regarding all of the focused dots.
If an appearance probability of displaced position of the focused dot 1601 and the neighboring dot 1602 from the respective grid is the same in the vertical and horizontal directions, the distance X at the mode position 1701 corresponds to the inter-grid interval based on the histogram of many focused dots. This inter-grid interval X is used in determination of destruction of additional security information.
θ=atan 2(dy,dx) (2)
If an appearance probability of displaced positions of the focused dots 1601 and the neighboring dot 1602 from the respective grid is the same in the vertical and horizontal directions, an average grid rotation angle can be measured by adding the angle differences for all of the focused dots.
The grid rotation angle φ can be approximated by Equation (4).
φ=atan 2(B,A) (4)
Here, reversed rotation of the grid rotation angle is executed on the absolute coordinate list stored in the absolute coordinate list storage unit 1304 to correct the grid angle. This correction of the rotation angle is in a unit of 90 degrees. However, in fact, the correction is not limited to four angles, 0 degrees (proper), 90 degrees, 180 degrees, and 270 degrees. This limitation will be described later.
[Decision of First Area]
Decision of first and second areas will now be described. Since the size 1103 of the first area, the repeated cycle 1104, and the position of the first area shown in
COR(A,B)=bitcount(not(A xor B)) (5)
Here, “xor” represents exclusive OR of two terms. “Not” represents negation, whereas “bitcount” is a function for counting the number of a value 1 included in a bit string. For example, when A and B are equal to “010b” and “011b”, respectively, not(A xor B)=not (001b)=110b, and a value of bitcount thereof is equal to 2.
Suppose that the first area is a matrix having predetermined width and height and a bit string for evaluating the first area is denoted by CELL (x, y), where x and y represent coordinates in the vertical and horizontal directions, respectively. For example, when the width and height of the first area are equal to 8 and 8, respectively, the length of the bit string CELL (x, y) is equal to 3 bits×8×8=192 bits in the first area whose upper left point is represented by x and y. The autocorrelation value of all of coordinates at a given offset is represented by Equation (6)
For example, when the size 1103 of the first area is equal to 8 and the repeated cycle 1104 is equal to 8×3=24, the autocorrelation value shows a peak 2101 at an offset equal to 24. The offset equal to 24 can be decided as the repeated cycle 1104.
The position and size of the first area 1101 will now be decided. The repeated cycle of the first area is decided by determining the autocorrelation. The position of the first area therein and the size of the first area have to be decided.
[Decryption of First Area]
Data of the first area is decrypted based on the position and size of the first area decided in the above-described procedure. Since a determination error due to a measurement error and a noise may occur using only a single area, positions of dots marked in all first areas are totalized, a mode value thereof is adopted, and an occurrence probability of the value is calculated.
Actual decryption is then executed. At this phase, since an influence of a noise and an error can not be eliminated, an error correction operation is performed on a decrypted result. First, as shown in
Although many kinds of error-correcting code are known as techniques in the related art, low density parity check (LDPC) is used here. The LDPC is known to have a significantly high error correcting capability and show a characteristic resembling the Shannon limit. A detailed description of the LDPC is omitted. In addition, any method other than the LDPC can be employable as long as the method has the characteristic of the error-correcting code. The use of the error-correcting code allows the embedded data to be extracted even if the extracted grid includes a certain level of error and noise.
Furthermore, as described in the correction of the rotation angle, since the rotation angle is corrected in a unit of 90 degrees, there are four types of extracted data, a proper data, data obtained by rotating the proper data by 90 degrees, data obtained by rotating the proper data by 180 degrees, and data obtained by rotating the proper data by 270 degrees.
Accordingly, the extracted data is rotated by 0 degrees, 90 degrees, 180 degrees, and 270 degrees, and decryption is executed on the results while performing error correction using the LDPC. The error-correcting code functions only for the proper rotation angle and the data can be extracted successfully.
The error-correcting operation is then executed on data (90-degree rotated data) 2402 resulting from 90-degree rotation performed on the extracted data 2401. Similarly, the error correction fails and the data cannot be extracted. Furthermore, the error-correcting operation is executed on data (180-degree rotated data) 2403 resulting from 90-degree rotation performed on the 90-degree rotated data 2402. In this case, the error correction also fails and the data cannot be extracted.
At last, the error-correcting operation is executed on data (270-degree rotated data) 2404 resulting from 90-degree rotation performed on the 180-degree rotated data 2403. Since this data is the proper data, the error correction operation succeeds. Accordingly, this data can be adopted as the extracted data. Even if the error-correcting operation fails regarding the 270-degree rotated data 2404, for example, a case where data extraction fails due to many errors and noises can be considered. In this manner, the embedded data contained in the first area can be extracted.
[Decision of Second Area]
The second area is used to register tracking information. Information registered in this area is not necessarily needed at the time of execution of a copy operation. Accordingly, if the information is not needed, a decrease in the entire processing speed can be suppressed by omitting decryption of the second area.
A method for deciding the second area will be described. First, as in the case of the first area, autocorrelation of the second area is determined. Since the second area is embedded at an interval integral multiple of the repeated cycle of the first area, an amount of the calculation can be reduced because the autocorrelation is determined at one of the integral multiples (e.g., 24, 48, 72, . . . ) of the repeated cycle of the first area. Furthermore, a repeated cycle of the second area is equal to the size of the second area.
At last, a start position of the second area is identified. Since the start position of the second area is set to match the start position of the first area at the time of embedding, the start position can be narrowed down to one of the start positions of the first areas.
The error-correction code is utilized in decision of the start position of the second area. As in the case of the first area, the error-correcting code is included in the second area in addition to the embedded data. Since the size of the second area is already known, the error-correcting operation is sequentially executed from the top position of the first area.
[Double-Embedding of Additional Security Information]
An operation regarding further embedding of additional security information in a document previously including additional security information (so-called double-embedding of additional security information) will now be described.
Referring to
On the other hand, referring to
In this case, two pieces of information, additional security information originally embedded in the document and additional security information newly embedded by the image forming apparatus 131, are embedded in the printed output (printed material) 3404. Accordingly, another coded image is combined at an area overlapping an area of a document image where a coded image has previously been combined. The image analyzing section 312 may be unable to successfully obtain these pieces of additional security information from a document having doubly embedded additional security information. Thus, further embedding of additional security information in a document previously having embedded additional security information destroys the original additional security information, which becomes a security hole.
[Operation of Job Control Determining Section (Pattern 1)]
As described with reference to
An operation performed by the job control determining section 903 to prevent further additional security information from being embedded in the document 3403 (or 3503) previously including the embedded additional information will now be described.
At the time of a start of a copy operation, the job control determining section 903 determines whether to instruct the printing section 314 to print or to cancel printing of image data obtained by performing necessary image processing on an image scanned by the image scanning section 901.
First, the job control determining section 903 waits for the image scanning section 901 to complete scanning an image (STEP S1). After the completion of scanning of the image, the job control determining section 903 extracts first information (information embedded in the first area) of the additional security information from the scanned image at the image analyzing section 312 (STEP S2). The job control determining section 903 determines whether the extraction of the first information has succeeded (STEP S3).
If the extraction of the first information has not succeeded (NO of STEP S3), the job control determining section 903 sets a flag LVBC_FLAG to FALSE and determines that additional security information is not originally embedded in the scanned image (STEP S4). This flag LVBC_FLAG is registered in a storage medium that the job control determining section 903 can access. The job control determining unit 903 then advances the process to STEP S14.
On the other hand, if the extraction of the first information has succeeded at STEP S3 (YES of STEP S3), the job control determining section 903 sets the flag LVBC_FLAG to TRUE and determines that additional security information is embedded in the scanned image (STEP S5). The job control determining section 903 detects existence or absence of a conditioned copy restriction code embedded (included) in the first information (STEP S6).
If the conditioned copy restriction code exists (is included) (YES of STEP S6), the job control determining section 903 extracts second information (information embedded in the second area of the additional security information) (STEP S10). The job control determining section 903 compares an authorization code extracted from the second area with a password input on the authorization dialog 702 (see
On the other hand, if it is determined that the authorization has succeeded (the passwords match) at STEP S11 (YES of STEP S11), the job control determining section 903 advances the process to STEP S14.
In addition, if the conditioned copy restriction code is not detected at STEP S6 (NO of STEP S6), the job control determining section 903 determines whether copying is permitted (STEP S7). If copying is permitted (YES of STEP S7), the job control determining section 903 advances the process to STEP S14. Here, a case where copying is permitted corresponds to a case where a document is printed under a setting of “permit copying” selected with the radio button 502 (see
On the other hand, if copying is not permitted at STEP S7 (NO of STEP S7), the job control determining section 903 instructs the printing section 314 to cancel the printing operation (STEP S8). Here, a case where copying is not permitted corresponds to a case where a document is printed under a setting of “prohibit copying” selected with the radio button 502 (see
After the processing of STEP S4 or in the case of YES at STEPs S7 and S11, the job control determining section 903 determines whether a user has selected the additional-security-information embedding setting or whether an administrator has selected the compulsory information embedding setting (STEP S14). The user selects the additional-security-information embedding setting by pressing the information embedding button 2904 (see
If the embedded setting is not selected (NO of STEP S14), the job control determining section 903 instructs the printing section 314 to print the document to be copied (hereinafter, referred to as a copy target document) (STEP S15). In the processing performed at STEP S15, the print instruction can be issued since the additional-security-information embedding setting does not exist at STEP S14 regardless of whether the additional security information has previously been embedded in the copy target document. Meanwhile, the operation performed by the job control determining section 903 corresponds to an operation of a print permitting unit.
On the other hand, if it is determined that additional-security-information embedding setting is selected at STEP S14 (YES of STEP S14), the job control determining section 903 determines whether additional security information has previously been embedded in the copy target document based on the value of the flag LVBC_FLAG (STEP S17).
If the flag LVBC_FLAG indicates FALSE, i.e., if the additional security information is not embedded, the job control determining section 903 instructs the printing section 314 to print image data including additional security information embedded by the image processing section 905 (STEP S18). In the processing performed at STEP S18, the instruction for printing the image data including the additional security information embedded by the image processing section 905 can be issued since the additional security information is not originally embedded in the copy target document.
After the processing of STEP S15 or S18, the job control determining section 903 determines whether a following copy target document exists (STEP S16). If the following copy target document exists (YES of STEP S16), the job control determining section 903 returns the process to STEP S1 and waits for the next document to be scanned. On the other hand, if the following copy target document does not exist (NO of STEP S16), the job control determining section 903 terminates this operation.
In addition, if it is determined that the flag LVBC_FLAG indicates TRUE at STEP S17, the job control determining section 903 instructs the printing section 314 to cancel printing of image data including additional security information embedded by the image processing section 905 (STEP S19) because embedding of further additional security information means double embedding and this has to be prohibited. Here, a case where the flag LVBC_FLAG is determined to be TRUE corresponds to a case where additional security information has previously been embedded in the copy target document. An operation performed by the job control determining section 903 at STEP S19 to cause the printing section 314 to suspend the printing corresponds to an operation of a print suspending unit. As shown in
Alternatively, the image forming apparatus may be configured so that the job control determining unit 903 can prohibit the image processing section 905 from combining the image, for example, and the job control determining section 903 may prohibit the embedding of new additional security information (i.e., combination of a new coded image) if the additional security information is possibly embedded doubly (if the flag indicates TRUE at STEP S17).
The job control determining section 903 displays a message indicating cancellation of the job on an operation panel (STEP S20). The job control determining section 903 then terminates this operation.
The image forming apparatus according to the first exemplary embodiment can prevent new additional security information from being combined and printed on a document previously including embedded additional security information. More specifically, when digital data is doubly embedded in a copy job, the image forming apparatus can prevent the double-embedding operation by canceling the job. Through this operation, a copy operation can be performed without destroying the additional security information and convenience of a user improves.
Since configurations of an image forming apparatus and a network printing system according to a second exemplary embodiment of the present invention are the same as those of the first exemplary embodiment, a description thereof is omitted by using the same numerals.
[Operation of Job Control Determining Section (Pattern 2)]
In the first exemplary embodiment, when additional security information is possibly embedded doubly, a print operation is cancelled. In the second exemplary embodiment, the printing operation is not cancelled unconditionally but whether to permit printing is decided according to a setting of an administrator even if the additional security information is possibly embedded doubly.
First, an administrator setting for permitting or prohibiting the printing operation when additional security information is embedded doubly will be described.
Radio buttons 3702 allow one of an option “IGNORE” for invalidating additional-security-information embedding setting and an option “CANCEL” for canceling a printing operation as in the case of
If the job control determining section 903 determines that the information embedding is not performed at the image processing section 905, embedding setting is treated as invalid even if the additional-security-information embedding setting is selected. The image processing section 905 operates to transfer an image received from an image scanning section 901 to a printing section 314 without processing the image. To realize this operation, the image processing section 905 starts the operation after receiving the determination result of the job control determining section 903 when the additional-security-information embedding setting is selected. This is indicated by an existence of the arrow 911 between the job control determining section 903 and the image processing section 905.
An operation for invalidating the additional-security-information embedding setting or for canceling a job regarding a document 3403 previously including embedded additional security information according to the administrator's setting of the double-embedding prevention button 3305 will be described.
Referring to
If a flag LVBC_FLAG indicates FALSE at STEP S47, the job control determining section 903 instructs the image processing section 905 to embed additional security information since additional security information has not been embedded (STEP S48). Furthermore, the job control determining section 903 instructs the printing section 314 to print a copy target document (STEP S49). The job control determining section 903 then terminates this operation.
On the other hand, if the flag LVBC_FLAG indicates TRUE at STEP S47, the job control determining section 903 instructs the image processing section 905 to invalidate the additional-security-information embedding setting (STEP S50). The job control determining section 903 determines the administrator's setting of the double-embedding prevention button 3305 (STEP S51).
If the double-embedding prevention button 3305 is set to “IGNORE”, the job control determining section 903 instructs the printing section 314 to print the copy target document (STEP S52). The print instruction given at STEP S52 is an instruction for performing a printing operation without embedding the additional security information according to the administrator's setting when the additional security information is possibly embedded doubly. Meanwhile, reception of this instruction corresponds to an operation of a receiving unit.
On the other hand, if the double-embedding prevention button 3305 is set to “CANCEL” at STEP S51, the job control determining section 903 instructs the printing section 314 to cancel the printing operation (STEP S53). The job control determining section 903 displays a message indicating cancellation of the job on an operation panel (STEP S54). The job control determining section 903 then terminates this operation.
The image forming apparatus according to the second exemplary embodiment can determine whether to permit a printing operation according to an administrator's setting without canceling the printing operation unconditionally even if the double-embedding possibly occurs. More specifically, when digital data is embedded doubly in a copy job, a double-embedding operation can be suppressed while adjusting tradeoff between trackability and job output by switching contents of the printing operation according to the setting “IGNORE” or “CANCEL”.
Since configurations of an image forming apparatus and a network printing system according to a third exemplary embodiment of the present invention are the same as those of the first exemplary embodiment, a description thereof is omitted by using the same numerals.
[Operation of Job Control Determining Section (Pattern 3)]
In the second exemplary embodiment, “IGNORE” for invalidating an embedding setting and “CANCEL” for canceling a job can be set according to an administrator's setting when double-embedding of additional security information possibly occurs. In the third exemplary embodiment, a description will be given for a case where a content of additional security information previously embedded in a copy target document is compared with that of additional security information to be embedded and permission or prohibition of a printing operation is decided according to the comparison result.
First, an administrator's setting regarding permission or prohibition of a printing operation when additional security information is doubly embedded will be described.
In the comparison of the embedded information, additional security information previously embedded in a copy target document is compared with copy prohibition information set in
According to the administrator's setting of the double-embedding prevention button 3305 (see
Referring to
If a flag LVBC_FLAG indicates TRUE at STEP S77, the job control determining section 903 instructs an image processing section 905 to invalidate an additional-security-information embedding setting (STEP S80). The job control determining section 903 determines the administrator's setting of the double-embedding prevention button 3305 (STEP S81). If the double-embedding prevention button 3305 is set to “DETERMINE AFTER COMPARING EMBEDDED INFORMATION”, the job control determining section 903 extracts a second area when the second area has not been extracted (STEP S82). The job control determining section 903 compares a content of additional security information previously embedded in a copy target document with a content of additional security information to be embedded (STEP S83). The operation performed by the job control determining section 903 corresponds to an operation of a matching determining unit. If the contents match, the job control determining section 903 instructs a printing section 314 to print a copy target document (STEP S84). The job control determining section 903 returns the process to STEP S76.
On the other hand, if the contents of the additional security information do not match at STEP S83, the job control determining section 903 instructs the printing section 314 to cancel the printing operation (STEP S85). Furthermore, the job control determining section 903 displays a message indicating cancellation of the job on an operation panel (STEP S86). The job control determining section 903 then terminates this operation.
In addition, if the double-embedding prevention button 3305 is set to “CANCEL” at STEP S81, the job control determining section 903 instructs the printing section 314 to cancel the printing operation as in the case of the double-embedding operation shown in
The image forming apparatus according to the third exemplary embodiment compares a content of additional security information previously embedded in a copy target document and a content of additional security information to be embedded and can determine whether to permit or prohibit a printing operation according to the comparison result. More specifically, an operation of doubly embedding digital data can be suppressed by switching kinds of the printing operation according to a result of comparison of embedded digital data with digital data to be embedded in a copy job.
In the above-described first, second, and third exemplary embodiments, a copy job using an image scanned by the image scanning section 901 as a copy target image has been described. In fourth, fifth, and sixth exemplary embodiments to be described below, a print job will be described. In the print job, an image forming apparatus further embeds additional security information in an image including additional security information embedded by a client PC, whereby double-embedding is caused (see
An operation performed when both of a client PC and an image forming apparatus embed additional security information will now be described. Since configurations of an image forming apparatus and a network printing system according to a fourth exemplary embodiment of the present invention are the same as those of the first exemplary embodiment, a description thereof is omitted by using the same numerals.
[Double-Embedding of Additional Security Information in Print Job]
The client PC 111 combines print data and additional security information according to a result of a user operation on a security setting dialog (see
On the other hand, a configuration of the image forming apparatus 131 that receives the print data is substantially the same as those shown in
In addition, a line 911 extending from a job control determining section 903 to an image processing section 905 is only used in “an operation of the job control determining section in a print job (pattern 2)” and “an operation of the job control determining section in a print job (pattern 3)” to be described later. As in the case of
[Operation of Job Control Determining Section in Print Job (Pattern 1)]
If the information is not embedded, the job control determining section 903 sets a flag LVBC_FLAG to FALSE (STEP S94). On the other hand, if the information is embedded, the job control determining section 903 sets the flag LVBC_FLAG to TRUE (STEP S93).
After STEP S93 and S94, the job control determining section 903 determines whether a compulsory information embedding setting, i.e., a compulsory information embedding setting 3304, is selected on an administrator setting dialog (see
If the compulsory information embedding setting is not selected, the job control determining section 903 instructs the printing section 314 to print the print data (STEP S96). In the processing at STEP S96, the print instruction can be issued since the additional-security-information embedding setting is not selected at STEP S95 regardless of whether the additional security information has previously been embedded in the printed data.
On the other hand, if the additional-security-information embedding setting is determined to exist at STEP S95, the job control determining section 903 determines whether additional security information has previously embedded in the print data based on the value of the flag LVBC_FLAG (STEP S98). If the flag LVBC_FLAG indicates FALSE, the additional security information has not been embedded. Thus, the job control determining section 903 instructs the printing section 314 to print the print data including the additional security information embedded by the image processing section 905 (STEP S99).
Since the additional security information is not embedded in the print data, the instruction for printing the print data including the additional security information embedded by the image processing section 905 can be issued in the processing of STEP S99.
After STEPS S96 and S99, the job control determining section 903 determines whether following print data exists (STEP S97). If the following print data exists, the job control determining section 903 returns the process to STEP S91 and waits for reception of the following print data to be completed. On the other hand, if the following print data does not exist, the job control determining section 903 terminates this operation.
On the other hand, if the flag LVBC_FLAG is determined to be TRUE at STEP S98 and the additional security information has previously been embedded in the print data, further embedding of additional security information means double-embedding and this has to be prohibited. The job control determining section 903 instructs the printing section 314 to cancel printing of the print data including the additional security information embedded by the image processing section 905 (STEP S100). The job control determining section 903 displays a message indicating cancellation of the job on an operation panel (STEP S101).
The image forming apparatus according to the fourth exemplary embodiment can suppress embedding of new additional security information in print data previously including embedded additional security information. More specifically, when double-embedding of digital data occurs in a print job, the double-embedding operation can be suppressed by canceling the job. This allows a printing operation to be performed without destroying additional security information and convenience of a user improves.
Since configurations of an image forming apparatus and a network printing system according to a fifth exemplary embodiment of the present invention are the same as those of the first exemplary embodiment, a description thereof is omitted by using the same numerals.
[Operation of Job Control Determining Section in Print Job (Pattern 2)]
In the fourth exemplary embodiment, a printing operation is cancelled when double-embedding of additional security information possibly occurs. In the fifth exemplary embodiment, a description will be given for a case where permission or prohibition of a printing operation is decided according to an administrator's setting instead of canceling the printing operation unconditionally when the double-embedding possibly occurs. Here, the administrator's setting for permitting or prohibiting the printing operation when the additional security information is embedded doubly is the same as that described using
Since processing of STEPs S111 to S118 is the same as that of STEPs S91 to S98 shown in
If a flag LVBC_FLAG is determined to be FALSE at STEP 5118, the job control determining section 903 instructs an image processing section 905 to embed additional security information since the additional security information has not been embedded (STEP S119). The job control determining section 903 instructs a printing section 314 to print the print data (STEP S120).
On the other hand, if the flag LVBC_FLAG is determined to be TRUE at STEP 5118, the job control determining section 903 instructs the image processing section 905 to invalidate the additional-security-information embedding setting (STEP S121). The job control determining section 903 determines the administrator's setting of the double-embedding prevention button 3305 (STEP S122).
If the double-embedding prevention button 3305 is set to “IGNORE”, the job control determining section 903 instructs the printing section 314 to print the print data (STEP S123). The print instruction issued at STEP 5123 is an instruction for performing the printing operation without embedding the additional security information according to the administrator's setting when the additional security information is embedded doubly. The job control determining section 903 then advances the process to STEP 5117.
On the other hand, if the double-embedding prevention button 3305 is set to “CANCEL” at STEP S122, the job control determining section 903 instructs the printing section 314 to cancel the printing operation as in the case of the double-embedding operation shown in
The image forming apparatus according to the fifth exemplary embodiment can decide permission or prohibition of a printing operation according to an administrator's setting without canceling the printing operation unconditionally even if double-embedding possibly occurs. More specifically, when digital data is embedded doubly in a print job, a double-embedding operation can be suppressed while adjusting tradeoff between trackability and job output by switching contents of the printing operation according to the setting “IGNORE” or “CANCEL”.
Since configurations of an image forming apparatus and a network printing system according to a sixth exemplary embodiment of the present invention are the same as those of the first exemplary embodiment, a description thereof is omitted by using the same numerals.
[Operation of Job Control Determining Section in Print Job (Pattern 3)]
In the fifth exemplary embodiment, “IGNORE” for invalidating an embedding setting and “CANCEL” for canceling a job can be set according to an administrator's setting at the time of double-embedding of additional security information. In the sixth exemplary embodiment, a description will be given for a case where a content of additional security information previously embedded in print data is compared with that of additional security information to be embedded and permission or prohibition of a printing operation is decided according to the comparison result. Since the administrator's setting for permitting or prohibiting the print operation when the additional security information is embedded doubly is the same as that described using
If a flag LVBC_FLAG is determined to be TRUE at STEP S138, the job control determining section 903 instructs an image processing section 905 to invalidate an additional-security-information embedding setting (STEP S141). The job control determining section 903 determines the administrator's setting of the double-embedding prevention button 3305 (STEP S142).
If the double-embedding prevention button 3305 is set to “DETERMINE AFTER COMPARING EMBEDDED INFORMATION”, the job control determining section 903 performs the following operation. In this case, the job control determining section 903 compares a content of additional security information previously embedded in print data with a content of additional security information to be embedded (STEP S143).
If the contents match, the job control determining section 903 instructs a printing section 314 to print the print data (STEP S144). On the other hand, if the contents of the additional security information do not match at STEP S143, the job control determining section 903 instructs the printing section 314 to cancel the printing operation (STEP S145). The job control determining section 903 displays a message indicating cancellation of the job on an operation panel (STEP S146). The job control determining section 903 then terminates this operation.
In addition, if the double-embedding prevention button 3305 is set to “CANCEL” at STEP 5142, the job control determining section 903 instructs the printing section 314 to cancel the printing operation as in the case of the double-embedding operation shown in
The image forming apparatus according to the sixth exemplary embodiment compares a content of additional security information previously embedded in print data and a content of additional security information to be embedded and can determine whether to permit a printing operation according to the comparison result. More specifically, an operation of doubly embedding digital data can be suppressed by switching kinds of the printing operation according to a result of comparison of embedded digital data with digital data to be embedded in a print job.
The present invention is not limited to the configurations of the above-described exemplary embodiments and can be applied to any given configuration as long as functions disclosed by Claims or functions of the configurations of the exemplary embodiments can be achieved.
For example, although LVBC is used as a coded image of copy restriction information and tracking information embedded in a background image in the exemplary embodiments, the coded image is not limited to the LVBC and may be one-dimensional barcode, two-dimensional barcode such as QR Code®, or digital watermark.
In addition, flowcharts shown in each exemplary embodiment may be executed by a system constituted by a plurality of devices or an apparatus constituted by a single device. In addition, the image forming apparatus includes a facsimile apparatus having a printing function and a multifunctional printer (MFP) having a printing function, a copy function, and a scanner function as well as a printing apparatus. In addition, the printing method is not limited to the electrophotographic method and various printing methods, such as an inkjet method, a thermal transfer method, a thermal method, an electrostatic method, and an electrosensitive method, can be employed.
Additionally, an object of the present invention is achieved by executing the following processing. More specifically, a storage medium having a software program code for realizing the functions of the above-described exemplary embodiments recoded thereon is supplied to the system or the apparatus and a computer (or a CPU and an MPU) included in the system or the apparatus reads out the program code stored on the storage medium.
In this case, the program code read out from the storage medium realizes the functions of the above-described exemplary embodiments and the program code and the storage medium having the program code recorded thereon constitute the present invention.
Types of the storage medium used for supplying the program code include, for example, a Floppy Disc®, a hard disk, a magneto-optical disc, an optical disc such as a CD-ROM, a CD-R, a CD-RW, and a DVD-ROM, a DVD-RAM, a DVD-RW, and a DVD+RW, a magnetic tape, a nonvolatile memory card, and a ROM. In addition, the program code may be downloaded via a network.
In addition, a case where a computer executes the read out program code to realize the functions of the above-described exemplary embodiments is included in the present invention. Additionally, a case where an operating system (OS) operating in the computer executes part of or all of actual processing based on instructions of the program code and the functions of the above-described exemplary embodiments are realized by the processing is also included in the present invention.
Furthermore, a case where the functions of the above-described exemplary embodiments are realized by the following processing is also included in the present invention. More specifically, a program code read out from a storage medium is written in a memory included in a function expansion board inserted into a computer or a function expansion unit connected to the computer. A CPU or the like included in the function expansion board or the function expansion unit executes part of or all of actual processing based on instructions of the program code.
While the present invention has been described with reference to exemplary embodiments, it is to be understood that the invention is not limited to the disclosed exemplary embodiments. The scope of the following claims is to be accorded the broadest interpretation so as to encompass all modifications and equivalent structures and functions.
This application claims the benefit of Japanese Application No. 2007-177634 filed on Jul. 5, 2007, which is hereby incorporated by reference herein in its entirety.
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
6548768, | Oct 01 1999 | ANOTO AKTIEBOLAG ANOTO AB | Determination of a position code |
7035426, | Jan 31 2000 | Canon Kabushiki Kaisha | Image processing apparatus, image processing method and a computer program product for judging whether image data include specific information related to copy protection |
7050604, | Oct 26 2000 | NEC PERSONAL COMPUTERS, LTD | Image data protection technique |
7680447, | Nov 15 2005 | TWITTER, INC | Method and apparatus for duplicating secure documents |
20070097413, | |||
20080297853, | |||
20090066977, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Dec 14 2011 | Canon Kabushiki Kaisha | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Nov 24 2016 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Sep 23 2020 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Date | Maintenance Schedule |
Jun 11 2016 | 4 years fee payment window open |
Dec 11 2016 | 6 months grace period start (w surcharge) |
Jun 11 2017 | patent expiry (for year 4) |
Jun 11 2019 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jun 11 2020 | 8 years fee payment window open |
Dec 11 2020 | 6 months grace period start (w surcharge) |
Jun 11 2021 | patent expiry (for year 8) |
Jun 11 2023 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jun 11 2024 | 12 years fee payment window open |
Dec 11 2024 | 6 months grace period start (w surcharge) |
Jun 11 2025 | patent expiry (for year 12) |
Jun 11 2027 | 2 years to revive unintentionally abandoned end. (for year 12) |